What new threats are you facing? PC Security Ultimate Guide (1)
Source: Internet
Author: User
KeywordsSecurity
The use of computers is becoming an adventure because the data we store and deliver on our computers, personal privacy, trade secrets, and so on are being increasingly threatened and the internet is no longer secure. Today, traditional viruses and junk mail have new accomplices-more dangerous spyware and adware. In addition, there are now "identity" thieves, who invade important databases to steal user personal information. Most seriously, organized crime has emerged in the internet world. In this article, we will describe the new threats to the computer users above and tell you how to take risks. In addition, we have evaluated the latest antispyware software. Viruses, spyware, and junk mail. After a wave of waves, once the computer is paralyzed, you may need to turn on the dusty typewriter. In fact, it is quite safe to have a PC that is not too complex. In order for your computer to withstand a variety of current or future security threats, we provide the following most important security recommendations. These 10 simple security measures will protect your hardware, software, and data. 1. Turn on Automatic Updates: Make sure that the Windows Automatic Updates feature is turned on. In Windows XP, open the Start-> Control Panel-> Security (in Category View)-> Automatic Updates (the steps in this procedure are only valid for Windows XP that has SP2 installed, and earlier Windows XP operations are slightly different). In Windows 2000, open the Start-> Settings-> Control Panel-> Automatic Updates. Regardless of which version of the Windows operating system, make sure that the Automatic Updates (recommended) option is selected. Alternatively, you can let Windows notify you when it starts downloading updated files, or do a manual update. (These setup steps are similar in Windows 98 and Windows Me, with little difference.) ) 2. Do not wait for Windows to update itself: If the computer does not boot for many days, do not wait for the Windows Update feature to start automatically. Set the Windows Update Web site (www.windowsupdate.com) to the home page of your browser. Typically, there is a lag between when Windows patches are published and when Windows updates start downloading. Microsoft will release Windows patches in the second Tuesday of each month, and you should manually check for updates every few weeks if you want to keep the system secure. Also, don't forget to set anti-virus and Anti-spyware software to be updated automatically (or check your updates yourself every week). 3. Using Windows XP Security Monitoring tool: The most popular new feature in Windows XP Service Pack 2 is the Windows Security Center, when the firewall or anti-virus software in your computerThe Security Center warns you if it is not open or is not updated in time. Windows XP's own firewall can only withstand some foreign intrusion, but it cannot prevent some suspicious external connections. We recommend that users turn off Windows XP's own firewall and install Zone Labs ZoneAlarm or other Third-party firewall tools to effectively prevent both security threats. 4. Display file extensions: Some viruses will be disguised as harmless file types, with fake extensions appended to the filename. For example, for files with a file name of "Funnycartoon.jpg.exe", if the system is set to hide extensions (as is the default for Windows XP and Windows 2000), you will only see ". jpg", but you cannot see ". exe". To facilitate the identification of such malicious files, start Windows Explorer, or open any folder, select the menu command Tools-> Folder Options-> View, and clear the check boxes in front of the "Hide extensions for known file types" option. Special tip: To see the files in Windows more comprehensively, select the Show All Files and folders check box, and clear the Hide protected operating system files check box. 5. Protect IE Security: Many people find that the security level of IE is set to "intermediate", the ActiveX control, applet and script monitoring is too loose. Some Web applications, such as online shopping forms and security scanners, require ActiveX and JavaScript to function correctly, but opening them also opens the door for malicious code and hackers. To make IE more secure, open the tools->internet option-> Security-> Custom Level in IE, expand the Drop-down list below the Security Settings dialog box, select High, and then click the Reset button. Unfortunately, after the IE security level is set to high, the browser will constantly eject the warning window when visiting the Web site. The solution to this problem is to add sites that you need to visit frequently to the Trusted sites list in IE: Select command tool->internet option-> Security, click the Trusted Sites icon, and then click the Site button. Enter the site address and click the Add button. If you need to add more sites, you can repeat this action (see the following screenshot of the trusted site). Note To clear the Require server verification (https:) for all sites in this zone check box. When you have finished setting up, click the OK button two times. 6. Enhance Firefox security: If you use the free browser Firfox developed by the Mozilla Foundation, you must download and install the plugin if you want to disable JavaScript for the site NoscripT, it is developed by Giorgio Maone. When you browse a Web page with Firefox, if you use Javascript,noscript on the page, a warning bar appears below the Web page. Click this warning bar to control the script on the site, either temporarily or permanently, or disable the script or other actions (see the screenshot of NoScript below). This program can also disable Flash animation or other Firefox plug-ins, but remember, if you disable Flash animation, some of the highlights on the Web page may be missed, but then again, those who fly around the ads can not see. NoScript is free software, but the author accepts donations, the address is www.noscript.net. 7. Handle email links with care: An important channel for virus-infected computers is through e-mail. In order to reduce the risk of virus infection due to e-mail, do not click on the link in the suspicious e-mail message, the text displayed in the message tends to obscure the real web address. The correct approach is to manually enter the URL in the browser's address bar, or to the homepage of the site, and then find the page that needs to be browsed. 8. Virus scanning of e-mail attachments: You must scan any e-mail attachments before opening them. Instead of double-clicking an attachment to open an e-mail message, you should save it to your computer's hard disk. Open Windows Explorer, right-click on the file, and select a virus scan command from the pop-up menu. It would be better if you set up your anti-virus software to automatically scan your e-mail messages. 9. Close the preview panel: Some malicious mail only needs to be displayed in the preview panel of the email transceiver to hack into your computer. Therefore, we recommend that users turn off the preview panel of the inbox. In Microsoft Outlook 2003, open the menu view, clear the Auto preview check box. In Outlook Express 6, open view-> layout, clear the Show preview Panel check box. In Mozilla Thunderbird, open view-> layout, clear the Message Panel check box (or use the open and Close Preview panel). 10. Read e-mail messages in plain text: Many malicious emails do their dirty things through HTML code, so if you read them in plain text, you're going to get them nowhere. In Outlook 2003, open the Tools-> option-> set-> e-mail options, select the Show all e-mail messages in plain text check box. In Outlook Express 6, open the Tools-> option-> Read, select the Show all e-mail messages in plain text check box. in Mozilla ThunderbiRd, select the view message body as plain text check box. 1 2 3 4 5 6 7 8 9 10 next page >> view full-text Navigation 1th page: 10 Simple security measures 2nd: Best Spyware Test 3rd page: Internet crime: Cyber civilization is doomed? (i) Page 4th: Internet crime: Cyber civilization towards destruction? (ii) page 5th: Information Brokerage companies: keeping privacy at risk page 6th: Advertising software: Hidden "The Private" (i) 7th: Advertising software: Hidden "to the" (ii) 8th: Advertising software: Hidden "The" "(iii) 9th page: Advertising software: Hidden" The "" the "(four) page 10th: Bao The way to protect the original: What is the new Threat PC Security Ultimate Guide (1) Back to network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.